HackDig : Dig high-quality web security articles for hackers

Cybersecurity predictions for 2021: automation set to drive spear phishing campaigns

In August, a cybersecurity webinar for US federal agents set out the leading security trends in their field. The event was attended by leading experts and cybersecurity directors from organizations such as the public/private partnership ACT-IAC and the US space agency NASA. The latter’s CIO, Mike Witt, explained, “We’ve got to get away from the mind-set of ‘
Publish At:2020-11-26 08:52 | Read:112 | Comments:0 | Tags:Business News Panda Security b2b cybersecurity predictions W

16 hardware and software platforms hacked in minutes. A contest or business reality?

To date in 2020, the Spanish Data Protection Agency (AEPD) has reported 837 security breaches affecting personal data, which is 201 more than those reported in the same period last year. Yet one in three of these are still without a security incident response plan, which underlines how the security teams charged with this task and with providing a forensic r
Publish At:2020-11-17 10:22 | Read:80 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b cyberat

The cold cyberwar and geopolitics: which weapons can protect endpoints?

Following World War II, the technological and arms race that began between the United States and the Soviet Union became known as the Cold War. The Cold War nowadays has entered into a new phase: cyberwarfare. Technology is increasingly being used to gain a competitive edge in global geopolitics, and governments are increasingly concerned about the strength
Publish At:2020-11-05 09:45 | Read:118 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b covid-1

Numerous points of entry lead to multi-million euro penalties for data security breaches.

Data security breaches are now among the most common serious incidents affecting businesses. In this respect, 2019 was a bad year for companies. It was a year that saw some of the highest penalties imposed for violating data protection regulations, with examples such as the 50 million euro fine on Google LLC for non-compliance with GDPR transparency rules an
Publish At:2020-10-29 09:40 | Read:152 | Comments:0 | Tags:Adaptive Defense Business News b2b data breach data control

Artificial Intelligence, disruptive innovation in cybersecurity

In the current reality in which the sheer number, professionalization, and sophistication of adversaries has forced organizations to bolster security policies and develop specific processes to prevent, detect, investigate, contain, and eradicate technologically advanced cyberattacks, Artificial Intelligence has burst onto the cybersecurity scene. AI has, in
Publish At:2020-10-22 06:27 | Read:179 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b technol

Measures to implement against critical vulnerabilities: Zerologon the Windows Netlogon security hole

Zerologon is the latest critical vulnerability detected in the Windows Server OS affecting all versions from 2008 up to the latest available from Microsoft. This vulnerability has a severity rating of 10.0, and there are already PoCs that can easily exploit the flaw. Get all the information you need about recent critical and serious vulnerabilities for which
Publish At:2020-10-16 06:09 | Read:296 | Comments:0 | Tags:Business News b2b patch management vulnerabilities Zerologon

Five keys for mitigating cybersecurity breaches

A rapid and efficient response to incidents is a key part of any good cybersecurity strategy. As cyberattacks evolve at pace, IT departments start to question traditional methods of dealing with new criminal gangs and threats, and understand that there is no single or simple way to counter them, given the complexity of the digital environment. Today, an effe
Publish At:2020-10-14 11:15 | Read:252 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b technol

The four areas that all cybersecurity policies should keep in mind

Just a few hours ago, we have seen how the low-cost airline Vueling, part of the IAG (Iberia) group, and the courier service Nacex, along with at least seven other smaller firms, have fallen victim to a vulnerability that exposed the data of thousands of employees who used the online learning services of the firms. And it is not the first time that such atta
Publish At:2020-10-06 08:39 | Read:213 | Comments:0 | Tags:Business News Tips advanced cybersecurity b2b vulnerabilitie

5 Reasons to join WatchGuardONE

WatchGuard and Panda Security channel partners can access the complete offering of products and benefits that this combined company delivers. After the acquisition completed by WatchGuard Technologies in the second quarter of this year, the company has included Panda Security’s range of endpoint solutions in its portfolio. The acquisition of Panda Security p
Publish At:2020-10-01 03:51 | Read:374 | Comments:0 | Tags:News Panda Security b2b cybersecurity solutions partners Wat

Carlos Arnal: “The economic impact of a DNS attack is too great to ignore the vulnerabilities that would enable it”

One of the main problems with DNS attacks is the increasing cost of the damage they cause, as well as their rapid evolution and the diverse range of attack types. Data exfiltration over DNS is a major concern in corporate environments. In order to protect themselves, organizations are prioritizing the security of network endpoints and improving DNS traffic m
Publish At:2020-09-30 12:13 | Read:210 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b dns int

Monitoring and response to vulnerabilities to mitigate cybersecurity risks

Cybersecurity is a cause for serious concern among companies. New serious or critical vulnerabilities are coming to light almost every day and cybercriminals look to exploit them, not to mention the numerous lower risk security holes that are also detected. PandaLabs, the cybersecurity laboratory at Panda Security, detected 76,000 alerts for exploits in 2019
Publish At:2020-09-30 12:13 | Read:218 | Comments:0 | Tags:Adaptive Defense Business b2b patch management vulnerabiliti

How to take your company into the cloud and telecommute securely

A growing number of organizations are opting to migrate their data and applications to the cloud given the numerous benefits that this delivers: cost savings on server maintenance, scalability, and easy access to data from anywhere, to name just three. The latter is particularly important today due to the massive increase in telecommuting in response to the
Publish At:2020-09-15 08:10 | Read:613 | Comments:0 | Tags:Adaptive Defense Business News advanced cybersecurity b2b cl

CactusPete APT group takes aim at military and financial targets

Nowadays, all types of businesses across all sectors are affected by cybercrime. This year, as the attack surface has grown due to the increase in telecommuting as a response to COVID-19, so other cyberthreats arising from generalized global uncertainty have also increased. Cybercriminals have not hesitated to take advantage of the situation in order to roll
Publish At:2020-09-01 16:11 | Read:285 | Comments:0 | Tags:Business Malware advanced cybersecurity apt b2b

Zero-day attacks: the cyber equivalent of COVID-19

Cybersecurity has changed markedly over the last few years. The first malware dates back to the 1970s and led to the creation of the first antivirus -Reaper-, designed to detect computers infected with the malware Creeper and remove it. Since then, cybersecurity has become increasingly important and is now an essential consideration for any organization. Thi
Publish At:2020-08-28 18:29 | Read:435 | Comments:0 | Tags:Adaptive Defense Business Malware b2b covid-19 zero day cybe

The Mirai botnet exploits a new vulnerability affecting companies around the world

Malware or malicious code has been around for over 40 years now, but its use to obtain control of a group of Internet-connected systems in something called a ‘botnet’ is a relatively new phenomenon. Botnets have been behind some of the most costly security incidents of the last 10 years and, consequently, companies around the world are going to great lengths
Publish At:2020-08-26 07:50 | Read:430 | Comments:0 | Tags:Business Malware News b2b botnets Mirai vulnerabilities Vuln

Tools